Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Trusted Computing
biblio
Trustworthiness Inference Framework in the Social Internet of Things: A Context-Aware Approach
Submitted by aekwall on Mon, 12/07/2020 - 12:31pm
context-aware approach
trustworthiness inference framework
trust generation
trust elements
sociological principles
social networking
recommendation trust
psychological principles
kernel-based nonlinear multivariate grey prediction model
kernel-based nonlinear multivariate grey prediction
internal similarity trust
human behaviors
fuzzy logic method
familiarity trust
external similarity trust
context-aware trustworthiness inference framework
Internet of Things
Social Internet of Things
grey systems
psychology
Trust management
Predictive models
trustworthiness
Fuzzy logic
smart objects
direct trust
Reliability
social networking (online)
composability
pubcrawl
Trusted Computing
Protocols
biblio
Determination of Trustworthiness of Cloud Service Provider and Cloud Customer
Submitted by aekwall on Mon, 12/07/2020 - 12:30pm
trustworthiness
trustworthy CSP
service-oriented computing environment
multidimensional dynamic trust evaluation scheme
Dynamic Trust Evaluation Scheme
CSP trustworthiness
Compliance Information
cloud customer
cloud service provider
service-oriented architecture
quality of service
Monitoring
Stakeholders
web services
trust
Computational modeling
simulation
composability
pubcrawl
Trusted Computing
Cloud Computing
biblio
A Symbolic Analysis of ECC-Based Direct Anonymous Attestation
Submitted by aekwall on Mon, 12/07/2020 - 12:25pm
symbol manipulation
Predictive Metrics
privacy
pubcrawl
public key cryptography
Resiliency
Scalability
secrecy
secrecy properties
neural style transfer
symbolic analysis
symbolic verification
Tamarin modelling
Tamarin prover
tpm
Trusted Computing
trusted platform module TPM-backed anonymous credentials
trusted platform modules
ECC-based version
authentication
composability
Cryptographic Protocols
cryptographic scheme
cyber-physical system security
digital signatures
direct anonymous attestation
ECC-based direct anonymous attestation
Analytical models
ECC-DAA
expected authentication
formal analysis
formal verification
IEC standards
ISO standards
mechanised analysis
biblio
Remote Attestation based Software Integrity of IoT devices
Submitted by aekwall on Mon, 12/07/2020 - 12:24pm
neural style transfer
trusted solution
trusted platform modules
Trusted Computing
tpm
telecommunication security
software trusted platform module
software integrity
security issues
Scalability
Resiliency
reasonable computational power
pubcrawl
Predictive Metrics
antivirus
message authentication
IoT devices
IoT
Internet of Things
HMAC values
HMAC
hashed message authentication code
cyber-physical system security
Cryptography
Cryptographic Protocols
cryptographic operations
composability
biblio
Dominance as a New Trusted Computing Primitive for the Internet of Things
Submitted by aekwall on Mon, 12/07/2020 - 12:24pm
resilience
Latches
mainstream IoT devices
neural style transfer
Nucleo-L476RG
operating systems
Predictive Metrics
pubcrawl
Raspberry Pi Compute Module 3
large-scale IoT deployments
Resiliency
Scalability
security of data
sensors
separate service processors
Servers
Trusted Computing
trusted platform modules
geographical area
central entity
CIDER performance overhead
CIDER system
composability
cyber-physical system security
dominant computing paradigms
firmware
firmware image
Authenticated-Watchdog-Timer
Hardware
HummingBoard Edge
Internet of Things
Internet-of-Things
IoT
IoT hardware
IoT platforms
large-scale industrial deployments
biblio
Physical Unclonable Functions (PUFs) Entangled Trusted Computing Base
Submitted by aekwall on Mon, 12/07/2020 - 12:23pm
Predictive Metrics
trusted platform modules
trusted computing base
Trusted Computing
SW-PUF measurements
software measurement physical unclonable function
Software measurement
software instruction
Software
Semiconductor device measurement
Scalability
Resiliency
Reliability
pubcrawl
program execution
processor chip ALU silicon biometrics
Clocks
Pollution measurement
physical unclonable functions
particular program instruction
neural style transfer
microprocessor chips
logic design
logic circuits
field programmable gate arrays
digital signatures
delays
data-dependent delay
cyber-physical system security
copy protection
composability
biblio
Study of Trust at Device Level of the Internet of Things Architecture
Submitted by aekwall on Mon, 12/07/2020 - 12:23pm
security risks
Logic gates
neural style transfer
Object recognition
Predictive Metrics
pubcrawl
Resiliency
Scalability
security risk
IoT security solutions
tamper proof
telecommunication security
Trusted Computing
Trusted Platform Module
trusted platform modules
unique device identifier
user authentication
authentication
IoT devices
IoT architecture model
Internet of Things
general Internet of Things architecture
examined IoT solutions
encryption
device management
device level encryption
cyber-physical system security
Cryptography
computer architecture
Computational modeling
composability
built-in security features
basic firewall protection
biblio
Research on Trusted Authentication Model and Mechanism of Data Fusion
Submitted by aekwall on Mon, 12/07/2020 - 12:23pm
software engineering
Predictive Metrics
pubcrawl
Resiliency
Scalability
sensor fusion
service model
ship cluster platform
ships
neural style transfer
system design framework
system requirements
Trusted Authentication
trusted authentication model
Trusted Computing
trusted platform modules
unified authentication platform
database design
authorisation
CAS
composability
cyber-physical system security
data fusion
Data integration
Data mining
Data models
authentication
Databases
information fusion
JA-SIG CAS
marine engineering
Marine vehicles
Media
message authentication
biblio
DeepTrust: A Deep User Model of Homophily Effect for Trust Prediction
Submitted by grigby1 on Wed, 12/02/2020 - 2:16pm
pair-wise deep neural network
user similarity measurement
user review behavior
user modeling
user feature vector cosine similarity
Trusted Computing
trust prediction
trust network
trust
social networking (online)
pubcrawl
product promotion
Computing Theory
online social networks
neural nets
information dissemination
Human Factors
Human behavior
economic networks
DeepTrust
deep user model
Decision Making
data sparsity insensitive model
biblio
Design of Trusted B2B Market Platforms using Permissioned Blockchains and Game Theory
Submitted by grigby1 on Wed, 12/02/2020 - 2:15pm
secure B2B collaboration
Human behavior
Human Factors
insert
online business-to-business collaboration platforms
permissioned blockchain
privacy
privacy preservation
private B2B collaboration
pubcrawl
Games
smart contracts
Strategic Agents
style
styling
trust
trusted B2B market platforms
trusted collaboration
Trusted Computing
cryptographic regulation protocols
blockchain
business data processing
business sensitive information
collaboration
competitive agents
component
Computing Theory
contracts
Cryptographic Protocols
adequate transparency
data privacy
deep business logic
electronic commerce
enterprise buyers
enterprise sellers
formatting
game theoretic modeling
game theory
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »